EP3541053B1 - Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium - Google Patents
Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium Download PDFInfo
- Publication number
- EP3541053B1 EP3541053B1 EP19172743.7A EP19172743A EP3541053B1 EP 3541053 B1 EP3541053 B1 EP 3541053B1 EP 19172743 A EP19172743 A EP 19172743A EP 3541053 B1 EP3541053 B1 EP 3541053B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- phone terminal
- cellular phone
- user
- identification information
- address book
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000001413 cellular effect Effects 0.000 title claims description 279
- 238000000034 method Methods 0.000 title claims description 22
- 238000012546 transfer Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 description 145
- 238000012545 processing Methods 0.000 description 47
- 230000004913 activation Effects 0.000 description 28
- 241000196324 Embryophyta Species 0.000 description 7
- 102100024412 GTPase IMAP family member 4 Human genes 0.000 description 3
- 101000833375 Homo sapiens GTPase IMAP family member 4 Proteins 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27467—Methods of retrieving data
- H04M1/2748—Methods of retrieving data by matching character strings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/2753—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
- H04M1/2757—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42348—Location-based services which utilize the location information of a target
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/74—Details of telephonic subscriber devices with voice recognition means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/53—Centralised arrangements for recording incoming messages, i.e. mailbox systems
- H04M3/533—Voice mail systems
Definitions
- the present invention relates generally to a cellular phone system, a cellular phone terminal, a private information protection method, a private information protection program and a program recorded medium, more specifically to a cellular phone system, a cellular phone terminal, a private information protection method, a private information protection program and a program recorded medium for protecting private information stored in a cellular phone terminal.
- a cellular phone terminal or a portable telephone terminal has an address book function in which the user is able to search the address book of the cellular phone terminal for simply dialing a desired telephone number or sending an electronic mail.
- a cellular phone terminal has a mail box function for saving electronic mail information of received electronic mails.
- a cellular phone terminal that is capable of gaining access to internet web pages has a bookmark function to register web page URLs for enabling the user to easily gaining access to his/her favorite web pages as disclosed in the following non-patent documents 1 through 4:
- KR 10-2006-0027065 discloses a voice call dialing method including a first step of the MS transmitting voice data recognized in a voice recognition dialing mode to a mobile switching center (MSC) to request voice recognition dialing; and a voice recognition server storing a telephone number for each registered voice data; a second step of requesting a telephone exchange to search for a telephone number by transmitting the received voice data; a third step of recognizing the position of the mobile communication terminal by the voice recognition server; and a fourth step of detecting a telephone number of a point adjacent to the detected position of the mobile communication terminal among a plurality of telephone numbers allocated and registered and transmitting the detected telephone number to a mobile switching center.
- US 2005/0026628 A1 discloses a positional information tracking and forwarding method for conducting an optimal forward destination control method to estimate the situations of a user.
- a position database stores a plurality of forward destinations for a call to the user that correspond to positional information and time period information (business hours or the like) of the forward destinations. This is used as a search table.
- For forwarding a call to the user the current position of the user is detected from the position of a mobile telephone carried by the user, and a forward destination list is created based on the detected current position of the user, the current time, and the search table.
- the forward destination list enumerates forward destinations that are arranged in an order in which the user is more likely to be present at the forward destinations.
- the forward destinations are selected one after another in accordance with the forward destination list to forward the call to the user.
- the present invention also provides a method of a server in accordance with claim 9.
- Fig. 1 shows the system configuration of the first exemplary embodiment of the cellular phone system according to the present invention.
- Fig. 1 (A) shows an instance when a cellular phone terminal 103 is located within a particular area of the private wireless network known as a wireless LAN area 102 of a wireless LAN access point 101.
- Fig. 1 (B) shows an instance when a cellular phone terminal 106 is located outside the wireless LAN area 102 but within the wireless cell of a public cellular phone base station 104, that is, within the cellular phone area 105 of the public wireless cellular phone network.
- the cellular phone system of this exemplary embodiment comprises a wireless LAN access point 101, cellular phone terminals 103, 106 and the wireless cellular phone base station 104.
- the wireless LAN area 102 in Fig. 1 is described as the service area of the wireless LAN access point 101 that is installed in a company, it is not necessarily limited to the wireless LAN and may be any private wireless network that is installed, for example, in a company or the like.
- the cellular phone terminals 103 and 106 are described in this particular exemplary embodiment to include three data processing functions that handle private information, i.e., address book functions 103a-106a, bookmark functions 103b-106b and mailbox functions 103c-106c, respectively, it should not be limited to these three data processing functions but is effectively applied to any functions that handle private information.
- Each of the cellular phone terminals 103 and 106 is a terminal that can be used in both of a public wireless cellular phone network that is usable in the cellular phone area 105 of the public wireless cellular phone base station 104 and the wireless LAN network that is usable in the wireless LAN area 102 of the wireless LAN access point 101.
- the cellular phone terminal 103 may be located in the particular area of the wireless LAN area 102 in, for example, a company for distinctive business use in the company.
- the cellular phone terminal 103 is set so that the three data processing functions of the address book function 103a, the bookmark function 103b and the mailbox function 103c are activated, thereby enabling the user of the cellular phone terminal 103 to use either one of the functions. Accordingly, the user is able to use, for example, the address book function 103a for conducting the search for any telephone number registered in the cellular phone terminal 103 and then calling the telephone number.
- the cellular phone terminal 106 is at a remote location from the wireless LAN area 102 but within the public area of the cellular phone area 105 in which general public users can use their cellular phone terminals.
- the cellular phone terminal 105 is set so that the three data processing functions of the address book function 106a, the bookmark function 106b and the mailbox function 106c are inactive and the user of the cellular phone terminal 106 is unable to use any one of the data processing functions. Accordingly, the user is unable to call any telephone number registered in, for example, the address book function 106a or reference to any telephone number in the address book function 106a.
- the cellular phone terminal 103 that was located within the wireless LAN area 102 moves outside the particular area of the wireless LAN area 102, all of the three data processing functions, i.e., the address book function 103a, the bookmark function 103b and mailbox function 103c that handle private information are non-activated or disabled so that the user can no longer use such functions.
- the cellular phone terminal 106 that was located outside the wireless LAN area 102 enters the wireless LAN area 102, the three data processing functions handling the private information, i.e., the address book function 106a, the bookmark function 106b and the mailbox function 106c that were unable to be used are activated again so that the user can use such functions.
- the wireless LAN area is set in a company or the like. Because of a restricted entry in the plant of a company or watching by security personnel or the like, it is not easy for unauthorized persons to enter the plant of a company and use any functions of their cellular phone terminals that handle private information. As a result, persons who use their cellular phone terminals in such wireless LAN area are most likely the users of the cellular phone terminals or other proper users who are permitted to use the cellular phone terminals.
- each data processing function handling private information such as the address book function, the bookmark function and the mailbox function that are installed in the cellular phone terminal is described to be activated or disenabled (non-activated) depending on whether or not the cellular phone terminal is located in the wireless LAN area, it is possible to change the data processing functions so that activation/non-activation of the data processing functions is set by activation/non-activation means depending on the user of the cellular phone terminal. In other words, at least one of the data processing functions may be set to be activated by the activation means or disabled by the non-activation means depending on the user of the cellular phone terminal.
- at least one part of function of at least one of the data processing functions that are activated by the activation means or disabled by the non-activation means are changed depending on any one of the plurality of private wireless networks.
- wireless LAN areas that can be entered are differentiated depending on the user's position in the company, the degree of protecting individual private information is controlled for each wireless LAN area in which the user enters.
- the second exemplary embodiment is a cellular phone terminal provided with both connection means for connecting to a public wireless cellular phone network that can be used by general public users and for connecting to a private wireless network that particular users are permitted to use as a closed network, wherein the cellular phone terminal includes at least one of the following data processing functions
- the cellular phone terminal when the cellular phone terminal enters the area of the private wireless network, at least one part of at least one of the three data processing functions is activated by the activation means included in the cellular phone terminal, information related to the users of the cellular phone terminal from at least one server of the three servers and/or at least one part of the information common to each user is downloaded and stored in the cellular phone terminal by the download means provided in the cellular phone terminal.
- the cellular phone terminal exits outside the area of the private wireless network, at least one part of the information of the server that is downloaded and stored in the cellular phone terminal by the download means is deleted by deleting means provided in the cellular phone terminal and at least one part of the activated functions is disabled by non-activation means provided in the cellular phone terminal.
- Fig. 2 shows the system configuration of the second embodiment of the cellular phone system according to the present invention.
- this embodiment of the cellular phone system comprises a network 202, a wireless LAN access point (WLAN AP) 203, an address book server 204, a bookmark information server 205, a mailbox server 206 and a cellular phone terminal 208.
- WLAN AP wireless LAN access point
- Fig. 2 shows the system configuration of the second exemplary embodiment of the cellular phone system.
- the cellular phone system in this particular embodiment comprises a network 202, a wireless LAN access point (WLAN AP) 203, an address book server 204, a bookmark information server 205, a mailbox server 206 and a cellular phone terminal 208.
- WLAN AP wireless LAN access point
- a wireless LAN area 209 in Fig. 2 is the service area of the wireless LAN access point 203 that is installed in a company.
- the present invention should not be limited only to a wireless LAN but may be any private wireless network.
- the cellular phone terminal 208 is provided with three data processing functions, i.e., an address book function 208a, a bookmark information function 208b and a mailbox function 208c as private information handling functions.
- the cellular phone terminal 208 is a terminal that can be used in either one of the public wireless cellular phone network that is usable in the cellular phone area of the wireless cellular phone base station (not shown in Fig. 2 ) and the wireless LAN network that is usable in the wireless LAN area 209 of the wireless LAN access point 203 as shown in Fig. 2 .
- the cellular phone terminal 208 is located in a particular area of the wireless LAN area 209 installed, for example, in a company and is in the distinctive condition to be used for the business of the company.
- the cellular phone terminal 208 is set so that the three data processing functions, i.e., the address book function 208a, the bookmark function 208b and the mailbox function 208c are activated. Accordingly, the user of the cellular phone terminal 208 is able to connect to the address book server 204, the bookmark information server 205 and the mailbox server 206 by way of the wireless LAN access point 203 and the network 202 for downloading the user data (private information) of the cellular phone terminal 208 and/or data common to any users. The cellular phone terminal 208 is in the condition that the user is able to use the downloaded data.
- the three data processing functions i.e., the address book function 208a, the bookmark function 208b and the mailbox function 208c are activated. Accordingly, the user of the cellular phone terminal 208 is able to connect to the address book server 204, the bookmark information server 205 and the mailbox server 206 by way of the wireless LAN access point 203 and the network 202 for downloading the user data (private information) of the
- the cellular phone terminal 208 is in the wireless LAN area 209 the user is able to use, for example, the address book function 208a for conducting the search for any telephone number downloaded in the cellular phone terminal 208 from the address book server 204 and calling the telephone number.
- the user data that is downloaded from the address book server 204, the bookmark information server 205 and the mailbox server 206 is deleted and the three data processing functions handling private information, i.e., the address book function 208a, the bookmark function 208b and the mailbox function 208c that were usable in the wireless LAN area 209 are non-activated. Either one of the data processing functions is no longer available to the user of the cellular phone terminal 208.
- the user of the cellular phone terminal 208 is unable to, for example, call any telephone number that is downloaded in the address book function 208a from the address book server 204 or make reference to any telephone number, thereby preventing private information from leaking in the similar manner as in the first embodiment.
- the three data processing functions handling private information i.e., the address book function, the bookmark function and the mailbox function that were not available are now activated.
- the cellular phone terminal 208 can be connected to the address book server 204, the bookmark information server 205 and the mailbox server 206 by way of the wireless LAN access point 203 and the network 202 for enabling the user of the cellular phone terminal 208 to download the respective user data (private information) and/or any data common to all users for subsequent use of the downloaded data.
- the wireless LAN area 209 is installed in a company or the like where entry in its plant is restricted or watched by security personnel or the like. It is therefore difficult for anyone other than authorized users of the cellular phone terminal to enter the wireless LAN area 209 in such company and use the functions of the cellular phone terminal for downloading user data (private information) or the like on the user of the cellular phone terminal from the address book server 204, the bookmark information server 205 and the mailbox server 206 and use the user data 8private information). Accordingly, it is most likely that the person who uses the cellular phone terminal 208 in the wireless LAN area 209 is the proper user of the cellular phone terminal or authorized users of such cellular phone terminal.
- Activation or non-activation of the three data processing functions i.e., the address book function, the bookmark function and the mailbox function that handle private information and then downloading or deletion of user data (private information) from the address book server 204, the bookmark information server 205 and the mailbox server 206 is described to be made depending on whether the cellular phone terminal enters the wireless LAN area or moves outside the wireless LAN area in this particular embodiment.
- change is made in at least one part of the function of at least one data processing functions that is activated by activation means or non-activated by non-activation means depending on the user of the cellular phone terminal.
- it is set to change at least one part of the information of the information (user data) to be downloaded/deleted depending on the user of the cellular phone terminal.
- At least one part of the function of at least one data processing function of the data processing functions to be activated by activation means or non-activated by non-activation means is set differently depending on the plurality of private networks.
- at least one part of the information of the information that are stored by downloading by downloading means or deleted by deleting means is differentiated.
- the third exemplary embodiment is the cellular phone system in which the cellular phone terminal is provided with connection means for connecting to a public wireless cellular phone network to be used by general public users and also to a private wireless network to be used by particular users as a closed local network, the cellular phone terminal is further provided with as a private information handling function at least one data processing function of:
- the cellular phone terminal when the cellular phone terminal enters the area of the private wireless network, at least one part of information of at least one of the three data processing functions is activated by activation means provided in the cellular phone terminal and at least one part of information that is encrypted and stored is restored by restoration means that is provided in the cellular phone terminal for making it available to the cellular phone terminal.
- the cellular phone terminal moves outside the area of the private wireless network, at least one part of information that is restored by the restoration means is encrypted by the encryption means that is included in the cellular phone terminal for storage and at least one function of the functions that are activated by the activation means is non-activated by the non-activation means included in the cellular phone terminal.
- the cellular phone terminal of this particular embodiment comprises an encryption key server that stores encryption key data for encrypting information to be stored in each data processing function or to restore the encrypted information.
- the cellular phone terminal may includes encryption key acquisition means for acquiring encryption key data from the encryption key server for the cellular phone terminal user.
- Encryption may be made by using encryption key data different from the one that is acquired by the encryption key acquisition means at the time of restoration.
- Fig. 3 shows a system configuration of the third exemplary embodiment of the cellular phone system according to the present invention.
- this particular embodiment of the cellular phone system comprises a network 302, a wireless LAN access point (WLAN AP) 303, a key data server 310 and a cellular phone terminal 308.
- WLAN AP wireless LAN access point
- the wireless LAN area 309 in Fig. 3 will be described as a service area of the wireless LAN access point 303 installed in a company, it should not be restricted to a wireless LAN but may be a private wireless network installed, for example, in a company.
- the cellular phone terminal 308 is provide with three data processing functions, i.e., an address book function 308a, a bookmark function 308b and a mailbox function 308c as private information handling functions.
- the cellular phone terminal 308 is a terminal that can be used in either one of a public wireless cellular phone network usable in a cellular phone area of a wireless cellular phone base station that is not shown in Fig. 3 and a wireless LAN network usable in the wireless LAN area 309 of the wireless LAN access point 303 in Fig. 3 .
- the cellular phone terminal 308 is located in a particular area so-called the wireless LAN area 309, for example, in a company and is in a distinctive condition to be used for the business of the company.
- the cellular phone terminal 308 is in the condition that the three data processing functions of the address book function 308a, the book mark function 308b and the mailbox function 308c are activated.
- the user of the cellular phone terminal 308 is able to use any one of the data processing functions after restoring information stored in the address book, the bookmark and the mailbox by using the encryption key data that is prepared in advance for the user of the cellular phone terminal 308 or by using the encryption key data for the user of the cellular phone terminal 308 that is downloaded from the key data server 310 to be connected by way of the wireless LAN access point 303 and the network 302.
- the address book function 308a As long as the user remains in the wireless LAN area 309, he/she is able to use, for example, the address book function 308a and conduct a search for a particular telephone number memorized in the cellular phone terminal 308 in the restored condition and call the phone number.
- the three data processing functions of handling private information i.e., the address book function, the bookmark function and the mailbox function that were not usable are now activated.
- the user of the cellular phone terminal is able to use anyone of the data processing functions by restoring the information stored in the address book, the bookmark and the mailbox using the encryption key data that is prepared in advance for the user of the cellular phone terminal or an encryption key data for the user of the cellular phone terminal that is downloaded from the key data server 310 after connecting by way of the wireless LAN access point 303 and the network 302.
- the wireless LAN area 309 is installed in a company or the like where anybody other than proper user of the cellular phone terminal is difficult to enter the wireless LAN area 309 in such company for handling the private information by utilizing the functions in the cellular phone terminals because of restricted entry into the plant of such company or careful watching by security personnel or the like. Accordingly, it is most likely that persons who use the cellular phone terminal in the wireless LAN area 309 are the proper user of the cellular phone terminal or other users permitted to use such cellular phone terminal.
- activation or non-activation of the three data processing functions of the address book function, the bookmark function and the mailbox function and subsequent restoration or encryption of the information (private information) stored in the address book, the bookmark and the mailbox is performed depending on whether the cellular phone terminal is in the wireless LAN area or outside such area. It is to noted, however, that the data processing functions to be activated or non-activated and the information (user data) to be restored or encrypted may be set to differ depending on the user of the cellular phone terminal.
- the fourth exemplary embodiment of the present invention comprises a cellular phone terminal provided with means for connecting to a public wireless cellular phone network usable by general public users and an address book server including means for connecting to a private network usable by particular users as a closed network and means for connecting to a public telephone network to which a wireless cellular phone base station of the public wireless cellular phone network or an IP network, wherein the cellular phone terminal calls the address book server and then the address book server calls based on the address book information stored in the address book server for relaying the call of the cellular phone terminal or transferring the call from the cellular phone terminal.
- the cellular phone terminal may comprise at least one of
- Fig. 4 shows the system configuration of the fourth exemplary embodiment of the cellular phone system according to the present invention.
- the fourth exemplary embodiment of the cellular phone system comprises an address book management system 401, a telephone network 404, a wireless cellular phone base station 405, cellular phone terminals 406, 407 and a telephone terminal 408.
- the address book management system 401 comprises a network 402, an address book server 403 and a presence server 409.
- the presence server 409 is a presence device that registers current locations of users of the cellular phone terminals.
- the telephone network 404 may be a VoIP (Voice over IP) that uses an IP network and a Session Initiation Protocol (SIP) for connecting a call.
- VoIP Voice over IP
- SIP Session Initiation Protocol
- the cellular phone terminal 406 has no telephone number data as the address book in the cellular phone terminal 406.
- the address book server 403 in order to use the address book function, firstly, it is necessary to call the address book server 403 in the address book management system 401 for making connection to the address book server 403 by way of the wireless cellular phone base station 405 and the telephone network 404.
- the address book server 403 that is connected to the telephone network 404 receives the call from the cellular phone terminal 406. A judgment is made on the user of the cellular phone terminal 406 from the telephone number of the calling cellular phone terminal 406 and a search is conducted on the private information (user data) for the user in the address book.
- the call of the cellular phone terminal 406 is transferred to the cellular phone terminal 407 or the telephone terminal 408 that the user likes to call or alternatively such call from the cellular phone 406 is relayed by the address book server 403 to call the cellular phone terminal 407 or the telephone terminal 408.
- the address book server 403 is called by the cellular phone terminal 406, leakage of private information is prevented by refusing to receive the call by the address book server 403 or by prohibiting the search of the address book by the cellular phone terminal 406. In other words, if there is a call from the cellular phone terminal 406 to prohibit the use of the address information that is stored in the address book server 403 or non-permitted telephone number, the address book server 403 is able to set not to relay or transfer any call from the particular cellular phone terminal 406.
- the address book server 403 that receives a call from the cellular phone terminal 406 asks the presence server 409 about the location of the user of the cellular phone terminal 406. After confirming whether user is in the plant or not, a decision is made whether the search of the address book or transfer or relay of a call should be permitted or refused, thereby restricting any unauthorized use of the address book in case when the cellular phone terminal is lost or stolen.
- Fig. 5 is a chart to describe one exemplified search method of telephone numbers in the fourth embodiment of the cellular phone system according to the present invention.
- the cellular phone terminal 505 (corresponding to the cellular phone terminal 406 in Fig. 4 ) is connected to the address book server 502 (corresponding to the address book server 403 in Fig. 4 ) by way of the wireless cellular phone base station 504 and the telephone network 503.
- the user of the cellular phone terminal 505 likes to call a cellular phone terminal of "person A", "aaaa (number) " is assigned to the address book server 502 as the sub-address of the ISDN.
- the address book server 502 conducts a search of the address book for the user of the cellular phone terminal 505 using the number "aaaa” for transferring to the telephone number for "person A” or relaying the call to "person A” and the call of the cellular phone terminal 505.
- the cellular phone terminal 505 sends the DTMF signal "bbbb (number)" to the address book server 502 by key operation. Then, the address book server 502 searches the address book of the user of the cellular phone terminal 505 using the number "bbbb", thereby transferring to the telephone number of "person B” or relaying the call to "person B” and the call of the cellular phone terminal 505.
- the voice recognition function of the address book server 502 recognizes the voice instructions and transfers to the telephone number of "person C” or relays the call to "person C” and the call the cellular phone terminal 505. Additionally, if voice certification is made in the voice recognition, it is possible to restrict the use of the address book of the address book server 502 by any unauthorized user of the cellular phone terminal.
- the fifth exemplary embodiment is the cellular phone system comprising a cellular phone terminal including means for connecting to an IP network by way of a public wireless cellular phone network to be used by general public, an address book server including means for connecting to the IP network by way of an HTTP server in a private network to be used by particular users as a closed network, a book mark information server including means for connecting to the IP network by way of the HTTP server in a private network to be used by particular users as a closed network, a mailbox server including means for connecting to the IP network by way of the HTTP server in a private network to be used by particular users as a closed network, and the HTTP server connected to the IP network for disclosing information stored in the address book server, the book mark information server and the mailbox server in accordance with the HTTP (HyperText Transfer Protocol) protocol.
- HTTP HyperText Transfer Protocol
- the cellular phone terminal is connected to the HTTP server for calling based on the telephone number information as included in the address book server.
- it transmits electronic mails based on the mail address information as included in the address book server, makes an internet web connection based on the book mark information as included in the bookmark information server, or browses electronic mail information as included in the mailbox server.
- the cellular phone terminal user certification is performed to decide whether or not information can be disclosed. It is possible not to disclose information to particular cellular phone terminal.
- Fig. 6 shows the system configuration of the fifth exemplary embodiment of the cellular phone terminal according to the present invention.
- this exemplary embodiment of the cellular phone system comprises a cellular phone private information management system 601, an IP network 608, a telephone network 609, a wireless cellular phone base station 610, cellular phone terminals 611, 612 and a telephone terminal 613.
- the cellular phone private information management system 601 comprises a network 602, an address book server 603, a bookmark information server 604, a mailbox server 605, a presence server 606 and an HTTP server 607.
- the HTTP server 607 in this particular exemplary embodiment is provided with a certification server 607a for performing user certification.
- the telephone network 609 may be a VoIP (Voice over IP) telephone that uses an IP network and connects a call using an SIP (Session Initiation Protocol) protocol.
- VoIP Voice over IP
- SIP Session Initiation Protocol
- the telephone network 609 may be integrated with the IP network 608.
- the cellular phone terminal 611 does not hold any data such as telephone number data as the address book, bookmark information, electronic mails or the like inside the cellular phone terminal 611.
- it is first required to connect to the HTTP server 607 in the cellular phone private information management system 601 by way of the wireless cellular phone base station 610 and the IP network 608.
- the HTTP server 607 connected to the IP network 608 receives a connection request from the cellular phone terminal 611 and starts the certification server 607a for performing user certification of the cellular phone terminal 611 by means of, for example, a password or the like.
- the HTTP server 607 discloses the user data (private information) on the user that is stored in the address book server 603, the bookmark server 604 and the mailbox server 605 in accordance with HTTP or HTTPS protocol. It is possible to use the browsing technique by, for example, HTTP or HTTPS in the cellular phone terminal 611 for the way of disclosing such data. It is also possible to provide the certification server 607a separately from the HTTP server 607, thereby performing the user certification of the cellular phone terminal 611 by accessing the certification server 607a when the address book server 603, the bookmark information server 604 or the mailbox server 605 when the cellular phone terminal 611 connects thereto.
- the HTTP server 607 receives a connection request from the cellular phone terminal 611, the HTTP server 607 is able to refuse the connection from the particular cellular phone terminal or the connection request is refused by user certification by the certification server 607a, thereby preventing leakage of private information.
- the HTTP server 607 is able to prohibit connection to the address book server 603, the bookmark information server 604 or the mailbox server 605 or alternatively to refuse connection to the cellular phone terminal 611 when there is a receiving call from the cellular phone terminal 611 having the non-permitted telephone number.
- the address book server 603, the bookmark information server 604 or the mailbox server 605 is prohibited to use the address book data stored in the address book server 603, the bookmark information stored in the bookmark information server 604 or the electronic mail information stored in the mailbox server 605 or alternatively refusing connection to the cellular phone terminal 611 when there is a connection request from the cellular phone terminal 611 having the non-permitted telephone number by way of the HTTP server 607.
- the HTTP server 607 that receives a connection request from the cellular phone terminal 611 asks the presence server 606 about the location of the user of the cellular phone terminal 611. After confirming whether or not the user is in the plant, a decision will be made whether the information in the address book, the bookmark or the mailbox should be disclosed or refused, thereby restricting the use of such private information in case when the cellular phone terminal 611 is lost or stolen.
- the address book server 603, the bookmark information server 604 or the mailbox server 605 asks the location of the user and a decision is made whether the connection to the cellular phone terminal 611 is permitted or refused based on the current location of the user of the cellular phone terminal 611 that is registered in the presence server 606 at the time of connection from the cellular phone terminal 611.
- Fig. 7 is a chart to describe one example of searching a telephone number in the fifth embodiment of the cellular phone system.
- the cellular phone terminal 705 (corresponding to the cellular phone terminal 611 in Fig. 6 ) is connected to the HTTP server 701 (corresponding to the HTTP server 607 in Fig. 6 ) by way of a wireless cellular phone base station 704 and an IP network 703. After passing the certification in the HTTP server 701, it is possible on the cellular phone terminal 705 to browse the address to contact each user of the cellular phone terminal 705 that is stored in an address book server 702 (corresponding to the address book server 603 in Fig. 6 ).
- the HTTP server 701 calls the telephone number of "person A” using, for example, "phone to” in the HTML language. In this way, it is possible to call the telephone number in the address book on the cellular phone terminal 705 that is stored in the address book server 702 without saving the telephone number information in the cellular phone terminal 705. In other words, if described based on the system configuration in Fig.
- one of the telephone numbers that are registered in the address book server 603 as private information of the user of the cellular phone terminal 611 is selected and the telephone number that is described in the HTML language "phone to" is transmitted to the IP network 608, thereby enabling to call the cellular phone terminal 612 or the telephone terminal 613 by way of, for example, the telephone network 609.
- Fig. 8 is a chart to describe an exemplified method of searching bookmarks in the fifth embodiment of the cellular phone system.
- a cellular phone terminal 805 (corresponding to the cellular phone terminal 611 in Fig. 6 ) is connected to an HTTP server 801 (corresponding to the HTTP server 607 in Fig. 6 ) by way of a wireless cellular phone base station 804 and an IP network 803.
- HTTP server 801 corresponding to the HTTP server 607 in Fig. 6
- IP network 803 After passing certification by the HTTP server 801, it is possible on the cellular phone terminal 805 to browse bookmark information on the users of the cellular phone terminal 805 stored in a bookmark information server 802 (corresponding to the bookmark information server 604 in Fig. 6 ) in accordance with HTTP or HTTPS.
- the HTTP server 801 makes a connection to a web server of his/her "favorite A” described in, for example, "URL” in the HTML language. In this manner, it is possible to access the web server on internet using the bookmark information on the cellular phone terminal 805 that is stored in the bookmark information server 802 without saving the bookmark information in the cellular phone terminal 805. In other words, if described using the system configuration in Fig.
- Fig. 9 is a chart to describe an exemplified method of searching electronic mail information in the fifth exemplary embodiment of the cellular phone system.
- a cellular phone terminal 905 (corresponding to the cellular phone terminal 611 in Fig. 6 ) is connected to an HTTP server 901 (corresponding to the HTTP server 607 in Fig. 6 ) by way of a wireless cellular phone base station 904 and an IP network 903.
- HTTP server 901 corresponding to the HTTP server 607 in Fig. 6
- IP network 903 After passing certification in the HTTP server 901, it is possible to browse on the cellular phone terminal 905 electronic mail information on users of the cellular phone terminal 905 stored in a mailbox server 902 (corresponding to the mailbox server 605 in Fig. 6 ) in accordance with HTTP, HTTPS or IMAP4 protocol.
- the HTTP server 901 When the user of the cellular phone terminal 905 chooses one of the electronic mail information, for example, electronic mail 1 from the browsed electronic mail information, the HTTP server 901 reads out the electronic mail 1 under the title of "Request for ising.” stored in the mailbox server 902 and transmits it to the cellular phone terminal 905 in accordance with the HTTP, HTTPS or IMAP4 protocol. In this manner, it is possible to browse the electronic mail information on the cellular phone terminal 905 stored in the mailbox server 902 without saving the electronic mail information in the cellular phone terminal 905. In other words, describing in the system configuration in Fig. 6 , it is possible to browse any desired electronic mail information in accordance with HTTP, HTTPS or IMAP4 protocol by choosing any one of the electronic mail information stored in the mailbox server 605 as the private information of the user of the cellular phone terminal 611.
- the exemplary embodiments are able to surely prevent private information from leaking in an unexpected situation when the cellular phone terminal is lost or stolen. Also, the present invention provides the aforementioned advantage without causing any inconvenience to the user of the cellular phone terminal. Moreover, the present invention is able to provide the aforementioned advantage with paying essentially no attention to private information protection by the user of the cellular phone terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Description
- The present invention relates generally to a cellular phone system, a cellular phone terminal, a private information protection method, a private information protection program and a program recorded medium, more specifically to a cellular phone system, a cellular phone terminal, a private information protection method, a private information protection program and a program recorded medium for protecting private information stored in a cellular phone terminal.
- Generally, a cellular phone terminal or a portable telephone terminal has an address book function in which the user is able to search the address book of the cellular phone terminal for simply dialing a desired telephone number or sending an electronic mail.
- Also, a cellular phone terminal has a mail box function for saving electronic mail information of received electronic mails. Moreover, a cellular phone terminal that is capable of gaining access to internet web pages has a bookmark function to register web page URLs for enabling the user to easily gaining access to his/her favorite web pages as disclosed in the following
non-patent documents 1 through 4: - Non-patent document 1: Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J., "SIP: Session Initiation Protocol", RFC 2543, March 1999
- Non-patent document 2: Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T, "Hypertext Transfer Protocol-HTTP/1.1", RFC 2616, June 1999
- Non-patent document 3: Berners-Lee, T., Connolly, D., "Hypertext Markup Language-2.0", RFC 1866, November 1995
- Non-patent document 4: Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL-
-
KR 10-2006-0027065 -
US 2005/0026628 A1 discloses a positional information tracking and forwarding method for conducting an optimal forward destination control method to estimate the situations of a user. A position database stores a plurality of forward destinations for a call to the user that correspond to positional information and time period information (business hours or the like) of the forward destinations. This is used as a search table. For forwarding a call to the user, the current position of the user is detected from the position of a mobile telephone carried by the user, and a forward destination list is created based on the detected current position of the user, the current time, and the search table. The forward destination list enumerates forward destinations that are arranged in an order in which the user is more likely to be present at the forward destinations. The forward destinations are selected one after another in accordance with the forward destination list to forward the call to the user. - However, registration numbers, telephone numbers, electronic mail addresses, bookmark information, electronic mail information and the likes included in the above-mentioned address, bookmark and mailbox functions are private information. In recent years, general public is increasing conscious to protection of private information and it is a social problem that such private information leaks when such cellular phone terminals are lost or stolen.
- In order to avoid such problem, there are developed some cellular phone terminals to restrict accessing to the address book and the mail box or dialing by means of password. However, such technique is not sufficient countermeasure against leakage of private information in that considerable burdens are imposed to the user for setting a password or for manually switching to a security mode, which is sometimes failed by the user. Additionally, a cellular phone terminal does not have enough capacity for a password.
- Moreover, since mobile centrex is gaining popularity in recent years, cellular phone terminals that can be used also as extensions by a wireless LAN in a company or the like are increasingly popular in a business field. Telephone numbers, mail address information and electronic mail information included in the address book function
- in such business use cellular phone terminals are clients' confidential information. As a result, the leakage of such confidential information causes immeasurable impact.
- In consideration of the above circumstances, it is an object of the present invention to provide a server in accordance with
claim 1. - The present invention also provides a method of a server in accordance with claim 9.
- For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description taken in connection with the accompanying drawings in which the reference numbers indicate like features and wherein:
-
Fig. 1 shows the system configuration of a first exemplary embodiment of the cellular phone system according to the present invention; -
Fig. 2 shows the system configuration of a second exemplary embodiment of the cellular phone system according to the present invention; -
Fig. 3 shows the system configuration of a third exemplary embodiment of the cellular phone system according to the present invention; -
Fig. 4 shows the system configuration of a fourth exemplary embodiment of the cellular phone system according to the present invention; -
Fig. 5 is an exemplified chart to describe how a telephone number search is conducted in the fourth exemplary embodiment of the cellular phone system according to the present invention; -
Fig. 6 shows the system configuration of a fifth exemplary embodiment of the cellular phone system according to the present invention; -
Fig. 7 is an exemplified chart to describe how a telephone number search is conducted in the fifth exemplary embodiment of the cellular phone system according to the present invention; -
Fig. 8 is an exemplified chart to describe how a bookmark search is conducted in the fifth exemplary embodiment of the cellular phone system according to the present invention; and -
Fig. 9 is an exemplified chart to describe how an e-mail information search is conducted in the fifth exemplary embodiment of the cellular phone system according to the present invention. - Now, exemplary embodiments of the cellular phone will be described in detail with reference to the accompanying drawings.
-
Fig. 1 shows the system configuration of the first exemplary embodiment of the cellular phone system according to the present invention. InFig. 1, Fig. 1 (A) shows an instance when acellular phone terminal 103 is located within a particular area of the private wireless network known as awireless LAN area 102 of a wirelessLAN access point 101. On the other hand,Fig. 1 (B) shows an instance when acellular phone terminal 106 is located outside thewireless LAN area 102 but within the wireless cell of a public cellularphone base station 104, that is, within thecellular phone area 105 of the public wireless cellular phone network. As shown in the system configuration inFig. 1 , the cellular phone system of this exemplary embodiment comprises a wirelessLAN access point 101,cellular phone terminals phone base station 104. - Although the
wireless LAN area 102 inFig. 1 is described as the service area of the wirelessLAN access point 101 that is installed in a company, it is not necessarily limited to the wireless LAN and may be any private wireless network that is installed, for example, in a company or the like. - Similarly, although the
cellular phone terminals address book functions 103a-106a,bookmark functions 103b-106b andmailbox functions 103c-106c, respectively, it should not be limited to these three data processing functions but is effectively applied to any functions that handle private information. - Each of the
cellular phone terminals cellular phone area 105 of the public wireless cellularphone base station 104 and the wireless LAN network that is usable in thewireless LAN area 102 of the wirelessLAN access point 101. As shown inFig. 1 (A) , thecellular phone terminal 103 may be located in the particular area of thewireless LAN area 102 in, for example, a company for distinctive business use in the company. For this end, thecellular phone terminal 103 is set so that the three data processing functions of theaddress book function 103a, thebookmark function 103b and themailbox function 103c are activated, thereby enabling the user of thecellular phone terminal 103 to use either one of the functions. Accordingly, the user is able to use, for example, theaddress book function 103a for conducting the search for any telephone number registered in thecellular phone terminal 103 and then calling the telephone number. - On the other hand, the
cellular phone terminal 106 is at a remote location from thewireless LAN area 102 but within the public area of thecellular phone area 105 in which general public users can use their cellular phone terminals. At this instance, thecellular phone terminal 105 is set so that the three data processing functions of theaddress book function 106a, thebookmark function 106b and themailbox function 106c are inactive and the user of thecellular phone terminal 106 is unable to use any one of the data processing functions. Accordingly, the user is unable to call any telephone number registered in, for example, theaddress book function 106a or reference to any telephone number in theaddress book function 106a. - If the
cellular phone terminal 103 that was located within thewireless LAN area 102 moves outside the particular area of thewireless LAN area 102, all of the three data processing functions, i.e., theaddress book function 103a, thebookmark function 103b andmailbox function 103c that handle private information are non-activated or disabled so that the user can no longer use such functions. On the contrary, if thecellular phone terminal 106 that was located outside thewireless LAN area 102 enters thewireless LAN area 102, the three data processing functions handling the private information, i.e., theaddress book function 106a, thebookmark function 106b and themailbox function 106c that were unable to be used are activated again so that the user can use such functions. - In general, as shown in the
wireless LAN area 102 inFig. 1 , the wireless LAN area is set in a company or the like. Because of a restricted entry in the plant of a company or watching by security personnel or the like, it is not easy for unauthorized persons to enter the plant of a company and use any functions of their cellular phone terminals that handle private information. As a result, persons who use their cellular phone terminals in such wireless LAN area are most likely the users of the cellular phone terminals or other proper users who are permitted to use the cellular phone terminals. - On the contrary, if cellular phone terminals are, for example, lost or stolen and any persons other than their proper users may attempt to use them, it is possible to prevent leakage of private information because such persons are difficult to enter the wireless LAN area and handle private information using the functions of such lost or stolen cellular phone terminals.
- In the particular exemplary embodiment, although each data processing function handling private information such as the address book function, the bookmark function and the mailbox function that are installed in the cellular phone terminal is described to be activated or disenabled (non-activated) depending on whether or not the cellular phone terminal is located in the wireless LAN area, it is possible to change the data processing functions so that activation/non-activation of the data processing functions is set by activation/non-activation means depending on the user of the cellular phone terminal. In other words, at least one of the data processing functions may be set to be activated by the activation means or disabled by the non-activation means depending on the user of the cellular phone terminal.
- It is also possible to provide a plurality of wireless LAN areas so as to change the data processing functions to be restricted for each wireless LAN area, at least a part of the data processing functions to be restricted, or the information to be activated or non-activated, for example, in the address book for each wireless LAN area. In other words, at least one part of function of at least one of the data processing functions that are activated by the activation means or disabled by the non-activation means are changed depending on any one of the plurality of private wireless networks. For example, in case of application in a company, wireless LAN areas that can be entered are differentiated depending on the user's position in the company, the degree of protecting individual private information is controlled for each wireless LAN area in which the user enters.
- The second exemplary embodiment is a cellular phone terminal provided with both connection means for connecting to a public wireless cellular phone network that can be used by general public users and for connecting to a private wireless network that particular users are permitted to use as a closed network, wherein the cellular phone terminal includes at least one of the following data processing functions
- (a) an address book function,
- (b) a bookmark function, and
- (c) a mailbox function
- (a) an address book server that stores address book information to be used in the address book function,
- (b) a bookmark information server that stores bookmark information to be used in the bookmark function, and
- (c) a mailbox server that stores electronic mail information to be used in the mailbox function that can be connected from the private wireless network.
- In the second exemplary embodiment, when the cellular phone terminal enters the area of the private wireless network, at least one part of at least one of the three data processing functions is activated by the activation means included in the cellular phone terminal, information related to the users of the cellular phone terminal from at least one server of the three servers and/or at least one part of the information common to each user is downloaded and stored in the cellular phone terminal by the download means provided in the cellular phone terminal. On the other hand, when the cellular phone terminal exits outside the area of the private wireless network, at least one part of the information of the server that is downloaded and stored in the cellular phone terminal by the download means is deleted by deleting means provided in the cellular phone terminal and at least one part of the activated functions is disabled by non-activation means provided in the cellular phone terminal.
- Now, this exemplary embodiment will be described in detail with reference to the drawings.
-
Fig. 2 shows the system configuration of the second embodiment of the cellular phone system according to the present invention. As shown in the system configuration inFig. 2 , this embodiment of the cellular phone system comprises anetwork 202, a wireless LAN access point (WLAN AP) 203, anaddress book server 204, abookmark information server 205, amailbox server 206 and acellular phone terminal 208. -
Fig. 2 shows the system configuration of the second exemplary embodiment of the cellular phone system. As shown in the system inFig. 2 , the cellular phone system in this particular embodiment comprises anetwork 202, a wireless LAN access point (WLAN AP) 203, anaddress book server 204, abookmark information server 205, amailbox server 206 and acellular phone terminal 208. - It is described that a
wireless LAN area 209 inFig. 2 is the service area of the wirelessLAN access point 203 that is installed in a company. However, it is to be noted that the present invention should not be limited only to a wireless LAN but may be any private wireless network. - Similarly, this exemplary embodiment is described that the
cellular phone terminal 208 is provided with three data processing functions, i.e., anaddress book function 208a, abookmark information function 208b and amailbox function 208c as private information handling functions. - The
cellular phone terminal 208 is a terminal that can be used in either one of the public wireless cellular phone network that is usable in the cellular phone area of the wireless cellular phone base station (not shown inFig. 2 ) and the wireless LAN network that is usable in thewireless LAN area 209 of the wirelessLAN access point 203 as shown inFig. 2 . As shown inFig. 2 , thecellular phone terminal 208 is located in a particular area of thewireless LAN area 209 installed, for example, in a company and is in the distinctive condition to be used for the business of the company. - In this instance, the
cellular phone terminal 208 is set so that the three data processing functions, i.e., theaddress book function 208a, thebookmark function 208b and themailbox function 208c are activated. Accordingly, the user of thecellular phone terminal 208 is able to connect to theaddress book server 204, thebookmark information server 205 and themailbox server 206 by way of the wirelessLAN access point 203 and thenetwork 202 for downloading the user data (private information) of thecellular phone terminal 208 and/or data common to any users. Thecellular phone terminal 208 is in the condition that the user is able to use the downloaded data. This means that as long as thecellular phone terminal 208 is in thewireless LAN area 209 the user is able to use, for example, theaddress book function 208a for conducting the search for any telephone number downloaded in thecellular phone terminal 208 from theaddress book server 204 and calling the telephone number. - On the other hand, in an instance when the
cellular phone terminal 208 moves outside thewireless LAN area 209 of the wirelessLAN access point 203, the user data that is downloaded from theaddress book server 204, thebookmark information server 205 and themailbox server 206 is deleted and the three data processing functions handling private information, i.e., theaddress book function 208a, thebookmark function 208b and themailbox function 208c that were usable in thewireless LAN area 209 are non-activated. Either one of the data processing functions is no longer available to the user of thecellular phone terminal 208. As a result, the user of thecellular phone terminal 208 is unable to, for example, call any telephone number that is downloaded in theaddress book function 208a from theaddress book server 204 or make reference to any telephone number, thereby preventing private information from leaking in the similar manner as in the first embodiment. - On the contrary, in an instance when the
cellular phone terminal 208 that was outside thewireless LAN area 209 enters thewireless LAN area 209, the three data processing functions handling private information, i.e., the address book function, the bookmark function and the mailbox function that were not available are now activated. Thecellular phone terminal 208 can be connected to theaddress book server 204, thebookmark information server 205 and themailbox server 206 by way of the wirelessLAN access point 203 and thenetwork 202 for enabling the user of thecellular phone terminal 208 to download the respective user data (private information) and/or any data common to all users for subsequent use of the downloaded data. - Generally, as shown by an
entry management area 201 inFig. 2 , thewireless LAN area 209 is installed in a company or the like where entry in its plant is restricted or watched by security personnel or the like. It is therefore difficult for anyone other than authorized users of the cellular phone terminal to enter thewireless LAN area 209 in such company and use the functions of the cellular phone terminal for downloading user data (private information) or the like on the user of the cellular phone terminal from theaddress book server 204, thebookmark information server 205 and themailbox server 206 and use the user data 8private information). Accordingly, it is most likely that the person who uses thecellular phone terminal 208 in thewireless LAN area 209 is the proper user of the cellular phone terminal or authorized users of such cellular phone terminal. - Activation or non-activation of the three data processing functions, i.e., the address book function, the bookmark function and the mailbox function that handle private information and then downloading or deletion of user data (private information) from the
address book server 204, thebookmark information server 205 and themailbox server 206 is described to be made depending on whether the cellular phone terminal enters the wireless LAN area or moves outside the wireless LAN area in this particular embodiment. However, it is possible to differently set the activation/non-activation of the data processing functions or change the information (user data) to be downloaded/deleted depending on the user of the cellular phone terminal. In other words, change is made in at least one part of the function of at least one data processing functions that is activated by activation means or non-activated by non-activation means depending on the user of the cellular phone terminal. Alternatively, it is set to change at least one part of the information of the information (user data) to be downloaded/deleted depending on the user of the cellular phone terminal. - It is also possible to provide a plurality of wireless LAN areas and change the data processing functions to be restricted for each wireless LAN area, differentiate at least one part of function of the data processing functions to be restricted, change the information (user data) to be downloaded/deleted, or change the information (user data) to be downloaded/deleted, for example, in the address book for each wireless LAN area. Moreover, it is possible to set so as to change at least one part of the function of at least one data processing functions or change at least one part of information of the information (user data) to be downloaded/deleted depending on locations of the wireless LAN areas. This means that at least one part of the function of at least one data processing function of the data processing functions to be activated by activation means or non-activated by non-activation means is set differently depending on the plurality of private networks. Moreover, at least one part of the information of the information that are stored by downloading by downloading means or deleted by deleting means is differentiated. In this instance, in case of the use, for example, in a company in which different wireless LAN areas are prepared depending on user' s business position, it is possible to control the degree of protection of the respective information for each wireless LAN area where the user enters.
- The third exemplary embodiment is the cellular phone system in which the cellular phone terminal is provided with connection means for connecting to a public wireless cellular phone network to be used by general public users and also to a private wireless network to be used by particular users as a closed local network, the cellular phone terminal is further provided with as a private information handling function at least one data processing function of:
- (a) an address book function,
- (b) a bookmark function, and
- (c) a mailbox function
- In this particular exemplary embodiment, when the cellular phone terminal enters the area of the private wireless network, at least one part of information of at least one of the three data processing functions is activated by activation means provided in the cellular phone terminal and at least one part of information that is encrypted and stored is restored by restoration means that is provided in the cellular phone terminal for making it available to the cellular phone terminal. On the other hand, when the cellular phone terminal moves outside the area of the private wireless network, at least one part of information that is restored by the restoration means is encrypted by the encryption means that is included in the cellular phone terminal for storage and at least one function of the functions that are activated by the activation means is non-activated by the non-activation means included in the cellular phone terminal.
- Moreover, the cellular phone terminal of this particular embodiment comprises an encryption key server that stores encryption key data for encrypting information to be stored in each data processing function or to restore the encrypted information. The cellular phone terminal may includes encryption key acquisition means for acquiring encryption key data from the encryption key server for the cellular phone terminal user. In case of restoring information stored in each data processing function after encryption by using the encryption key data that is acquired from the encryption key server, when storing the restored information after encrypting such information again, it is possible to encrypt again at least one part of information of at least one of the restored information by using the same encryption key data that is acquired from the encryption key server by the encryption key acquisition means at the time of restoration. Encryption may be made by using encryption key data different from the one that is acquired by the encryption key acquisition means at the time of restoration.
- Now, a detailed description of this particular exemplary embodiment will be made hereunder with reference to the drawings.
-
Fig. 3 shows a system configuration of the third exemplary embodiment of the cellular phone system according to the present invention. As shown in the system configuration inFig. 3 , this particular embodiment of the cellular phone system comprises anetwork 302, a wireless LAN access point (WLAN AP) 303, akey data server 310 and acellular phone terminal 308. - Although the
wireless LAN area 309 inFig. 3 will be described as a service area of the wirelessLAN access point 303 installed in a company, it should not be restricted to a wireless LAN but may be a private wireless network installed, for example, in a company. - Similarly, although this particular exemplary embodiment will be described that the
cellular phone terminal 308 is provide with three data processing functions, i.e., anaddress book function 308a, abookmark function 308b and amailbox function 308c as private information handling functions. - The
cellular phone terminal 308 is a terminal that can be used in either one of a public wireless cellular phone network usable in a cellular phone area of a wireless cellular phone base station that is not shown inFig. 3 and a wireless LAN network usable in thewireless LAN area 309 of the wirelessLAN access point 303 inFig. 3 . As shown inFig. 3 , thecellular phone terminal 308 is located in a particular area so-called thewireless LAN area 309, for example, in a company and is in a distinctive condition to be used for the business of the company. - At this time, the
cellular phone terminal 308 is in the condition that the three data processing functions of theaddress book function 308a, thebook mark function 308b and themailbox function 308c are activated. This means that the user of thecellular phone terminal 308 is able to use any one of the data processing functions after restoring information stored in the address book, the bookmark and the mailbox by using the encryption key data that is prepared in advance for the user of thecellular phone terminal 308 or by using the encryption key data for the user of thecellular phone terminal 308 that is downloaded from thekey data server 310 to be connected by way of the wirelessLAN access point 303 and thenetwork 302. Accordingly, as long as the user remains in thewireless LAN area 309, he/she is able to use, for example, theaddress book function 308a and conduct a search for a particular telephone number memorized in thecellular phone terminal 308 in the restored condition and call the phone number. - On the other hand, when the
cellular phone terminal 308 moves outside thewireless LAN area 309 of the wirelessLAN access point 303, information restored using the encryption key data for the user of thecellular phone terminal 308 is encrypted again using the encryption key data and stored in the address book, the bookmark and the mailbox. The three data processing functions of theaddress book function 308a, thebook mark function 308b and themailbox function 308c handling private data that were usable so far are now set to the non-activation condition, thereby disabling the user of thecellular phone terminal 308 to use anyone of the data processing functions. Accordingly, so long as the user is outside thewireless LAN area 309, he/she is unable to call using any telephone number registered in, for example, theaddress book function 308a or browse the telephone numbers, thereby preventing private information from leaking in the similar manner as the first and second embodiments. - When moving outside the
wireless LAN area 309, it is possible to perform encryption without newly acquiring the encryption key data from thekey data server 310 if encrypted information is stored in the address book, the bookmark and the mailbox by using the same encryption key data as used for restoration when entered the wireless LAN area. On the other hand, in case of using any encryption data different from the one used for restoration when entering thewireless LAN area 309, protection for private information to be stored in the address book, the bookmark and the mailbox will be enhanced. In this case, it is necessary to save the different encryption data used for encryption in thekey data server 310 by way of the wirelessLAN access point 303 and thenetwork 302 in preparation for the next entrance in the wireless LAN area. - On the contrary, when the cellular phone terminal that was outside the
wireless LAN area 309 enters thewireless LAN area 309, the three data processing functions of handling private information, i.e., the address book function, the bookmark function and the mailbox function that were not usable are now activated. This means that the user of the cellular phone terminal is able to use anyone of the data processing functions by restoring the information stored in the address book, the bookmark and the mailbox using the encryption key data that is prepared in advance for the user of the cellular phone terminal or an encryption key data for the user of the cellular phone terminal that is downloaded from thekey data server 310 after connecting by way of the wirelessLAN access point 303 and thenetwork 302. - Generally, as shown in the entrance/
exit management area 301 inFig. 3 , thewireless LAN area 309 is installed in a company or the like where anybody other than proper user of the cellular phone terminal is difficult to enter thewireless LAN area 309 in such company for handling the private information by utilizing the functions in the cellular phone terminals because of restricted entry into the plant of such company or careful watching by security personnel or the like. Accordingly, it is most likely that persons who use the cellular phone terminal in thewireless LAN area 309 are the proper user of the cellular phone terminal or other users permitted to use such cellular phone terminal. - It is described in this particular embodiment that activation or non-activation of the three data processing functions of the address book function, the bookmark function and the mailbox function and subsequent restoration or encryption of the information (private information) stored in the address book, the bookmark and the mailbox is performed depending on whether the cellular phone terminal is in the wireless LAN area or outside such area. It is to noted, however, that the data processing functions to be activated or non-activated and the information (user data) to be restored or encrypted may be set to differ depending on the user of the cellular phone terminal. In other words, out of at least one data processing functions that are activated by the activation means or non-activated by the non-activation means depending on the user of the cellular phone terminal, at least one part of such functions is differentiated and at least one part of information of the restored /encrypted information (user data) may be differentiated.
- It is also possible to provide a plurality of wireless LAN areas each having different data processing functions to be restricted, differentiate at least one part of data processing functions to be restricted, differentiate information (user data) to be restored/encrypted, or differentiate information (user data) to be restored/encrypted in, for example, the address book. This means that at least one part of the function of at least one of the data processing functions to be activated by the activation means or non-activated by the non-activation means is set to be different depending on particular one of the plurality of private wireless networks. Moreover, it is possible to differentiate at least one part of information of the information to be restored by the restoration means or encrypted by the encryption means. In this case, if it is the use in, for example, a company, it is possible to enhance the protection of individual information for each wireless LAN area by differentiating the wireless LAN areas that are permitted to enter depending on the business position of the user in the company.
- The fourth exemplary embodiment of the present invention comprises a cellular phone terminal provided with means for connecting to a public wireless cellular phone network usable by general public users and an address book server including means for connecting to a private network usable by particular users as a closed network and means for connecting to a public telephone network to which a wireless cellular phone base station of the public wireless cellular phone network or an IP network, wherein the cellular phone terminal calls the address book server and then the address book server calls based on the address book information stored in the address book server for relaying the call of the cellular phone terminal or transferring the call from the cellular phone terminal.
- Moreover, the cellular phone terminal may comprise at least one of
- (a) a calling function using ISDN sub-address and
- (b) a DTMF signal transmission function
- Now, the fourth exemplary embodiment will be described in detail with reference to the accompanying drawings.
-
Fig. 4 shows the system configuration of the fourth exemplary embodiment of the cellular phone system according to the present invention. As shown in the system configuration inFig. 4 , the fourth exemplary embodiment of the cellular phone system comprises an addressbook management system 401, atelephone network 404, a wireless cellularphone base station 405,cellular phone terminals telephone terminal 408. The addressbook management system 401 comprises anetwork 402, anaddress book server 403 and apresence server 409. Thepresence server 409 is a presence device that registers current locations of users of the cellular phone terminals. - It is to be noted in this exemplary embodiment that the
telephone network 404 may be a VoIP (Voice over IP) that uses an IP network and a Session Initiation Protocol (SIP) for connecting a call. - The
cellular phone terminal 406 has no telephone number data as the address book in thecellular phone terminal 406. As a result, in order to use the address book function, firstly, it is necessary to call theaddress book server 403 in the addressbook management system 401 for making connection to theaddress book server 403 by way of the wireless cellularphone base station 405 and thetelephone network 404. Theaddress book server 403 that is connected to thetelephone network 404 receives the call from thecellular phone terminal 406. A judgment is made on the user of thecellular phone terminal 406 from the telephone number of the callingcellular phone terminal 406 and a search is conducted on the private information (user data) for the user in the address book. Then, the call of thecellular phone terminal 406 is transferred to thecellular phone terminal 407 or thetelephone terminal 408 that the user likes to call or alternatively such call from thecellular phone 406 is relayed by theaddress book server 403 to call thecellular phone terminal 407 or thetelephone terminal 408. - Unexpectedly, if the
cellular phone terminal 406 is lost or stolen, such case has immediately been registered in theaddress book server 403. When theaddress book server 403 is called by thecellular phone terminal 406, leakage of private information is prevented by refusing to receive the call by theaddress book server 403 or by prohibiting the search of the address book by thecellular phone terminal 406. In other words, if there is a call from thecellular phone terminal 406 to prohibit the use of the address information that is stored in theaddress book server 403 or non-permitted telephone number, theaddress book server 403 is able to set not to relay or transfer any call from the particularcellular phone terminal 406. - Moreover, if it is possible to recognize the location of the user of the
cellular phone terminal 406 by means of, for example, entrance permission to the plant, entrance/exit management or the like and report it to thepresence server 409 in the addressbook management system 401, theaddress book server 403 that receives a call from thecellular phone terminal 406 asks thepresence server 409 about the location of the user of thecellular phone terminal 406. After confirming whether user is in the plant or not, a decision is made whether the search of the address book or transfer or relay of a call should be permitted or refused, thereby restricting any unauthorized use of the address book in case when the cellular phone terminal is lost or stolen. - Methods of searching a desired number for connecting the
cellular phone terminal 406 by theaddress book server 403 include the use of the sub-address of the ISDN, the use of the DTMF signal or by voice recognition. Such search methods will be described further with reference toFig. 5. Fig. 5 is a chart to describe one exemplified search method of telephone numbers in the fourth embodiment of the cellular phone system according to the present invention. - In
Fig. 5 , the cellular phone terminal 505 (corresponding to thecellular phone terminal 406 inFig. 4 ) is connected to the address book server 502 (corresponding to theaddress book server 403 inFig. 4 ) by way of the wireless cellularphone base station 504 and thetelephone network 503. Assuming in this instance that, for example, the user of thecellular phone terminal 505 likes to call a cellular phone terminal of "person A", "aaaa (number) " is assigned to theaddress book server 502 as the sub-address of the ISDN. Then, theaddress book server 502 conducts a search of the address book for the user of thecellular phone terminal 505 using the number "aaaa" for transferring to the telephone number for "person A" or relaying the call to "person A" and the call of thecellular phone terminal 505. - Similarly, as for the method of using the DTMF signal, if the user of the
cellular phone terminal 505 likes to call, for example, "person B", thecellular phone terminal 505 sends the DTMF signal "bbbb (number)" to theaddress book server 502 by key operation. Then, theaddress book server 502 searches the address book of the user of thecellular phone terminal 505 using the number "bbbb", thereby transferring to the telephone number of "person B" or relaying the call to "person B" and the call of thecellular phone terminal 505. - Similarly, as for the method by voice recognition, if the user of the
cellular phone terminal 505 likes to call, for example, "person C", voice instructions such as "person C" or "cccc" are given to theaddress book server 502. Then, the voice recognition function of theaddress book server 502 recognizes the voice instructions and transfers to the telephone number of "person C" or relays the call to "person C" and the call thecellular phone terminal 505. Additionally, if voice certification is made in the voice recognition, it is possible to restrict the use of the address book of theaddress book server 502 by any unauthorized user of the cellular phone terminal. - The fifth exemplary embodiment is the cellular phone system comprising a cellular phone terminal including means for connecting to an IP network by way of a public wireless cellular phone network to be used by general public, an address book server including means for connecting to the IP network by way of an HTTP server in a private network to be used by particular users as a closed network, a book mark information server including means for connecting to the IP network by way of the HTTP server in a private network to be used by particular users as a closed network, a mailbox server including means for connecting to the IP network by way of the HTTP server in a private network to be used by particular users as a closed network, and the HTTP server connected to the IP network for disclosing information stored in the address book server, the book mark information server and the mailbox server in accordance with the HTTP (HyperText Transfer Protocol) protocol.
- In this exemplary embodiment, the cellular phone terminal is connected to the HTTP server for calling based on the telephone number information as included in the address book server. Alternatively, it transmits electronic mails based on the mail address information as included in the address book server, makes an internet web connection based on the book mark information as included in the bookmark information server, or browses electronic mail information as included in the mailbox server.
- Moreover, if the cellular phone terminal is connected to the HTTP server, the cellular phone terminal user certification is performed to decide whether or not information can be disclosed. It is possible not to disclose information to particular cellular phone terminal.
- Now, the fifth exemplary embodiment will be described in detail hereunder with reference to the accompanying drawing.
-
Fig. 6 shows the system configuration of the fifth exemplary embodiment of the cellular phone terminal according to the present invention. As shown in the system configuration inFig. 6 , this exemplary embodiment of the cellular phone system comprises a cellular phone privateinformation management system 601, anIP network 608, atelephone network 609, a wireless cellularphone base station 610,cellular phone terminals 611, 612 and atelephone terminal 613. The cellular phone privateinformation management system 601 comprises a network 602, anaddress book server 603, abookmark information server 604, amailbox server 605, apresence server 606 and anHTTP server 607. TheHTTP server 607 in this particular exemplary embodiment is provided with acertification server 607a for performing user certification. - It is to be noted in this exemplary embodiment that the
telephone network 609 may be a VoIP (Voice over IP) telephone that uses an IP network and connects a call using an SIP (Session Initiation Protocol) protocol. In this case, thetelephone network 609 may be integrated with theIP network 608. - The
cellular phone terminal 611 does not hold any data such as telephone number data as the address book, bookmark information, electronic mails or the like inside thecellular phone terminal 611. As a result, in order to use such data, it is first required to connect to theHTTP server 607 in the cellular phone privateinformation management system 601 by way of the wireless cellularphone base station 610 and theIP network 608. TheHTTP server 607 connected to theIP network 608 receives a connection request from thecellular phone terminal 611 and starts thecertification server 607a for performing user certification of thecellular phone terminal 611 by means of, for example, a password or the like. If the connection of thecellular phone terminal 611 is permitted by thecertification server 607a, theHTTP server 607 discloses the user data (private information) on the user that is stored in theaddress book server 603, thebookmark server 604 and themailbox server 605 in accordance with HTTP or HTTPS protocol. It is possible to use the browsing technique by, for example, HTTP or HTTPS in thecellular phone terminal 611 for the way of disclosing such data. It is also possible to provide thecertification server 607a separately from theHTTP server 607, thereby performing the user certification of thecellular phone terminal 611 by accessing thecertification server 607a when theaddress book server 603, thebookmark information server 604 or themailbox server 605 when thecellular phone terminal 611 connects thereto. - In an event that the
cellular phone terminal 611 is lost or stolen, such event is immediately registered in theHTTP server 607. When theHTTP server 607 receives a connection request from thecellular phone terminal 611, theHTTP server 607 is able to refuse the connection from the particular cellular phone terminal or the connection request is refused by user certification by thecertification server 607a, thereby preventing leakage of private information. In other words, theHTTP server 607 is able to prohibit connection to theaddress book server 603, thebookmark information server 604 or themailbox server 605 or alternatively to refuse connection to thecellular phone terminal 611 when there is a receiving call from thecellular phone terminal 611 having the non-permitted telephone number. Moreover, it is possible that theaddress book server 603, thebookmark information server 604 or themailbox server 605 is prohibited to use the address book data stored in theaddress book server 603, the bookmark information stored in thebookmark information server 604 or the electronic mail information stored in themailbox server 605 or alternatively refusing connection to thecellular phone terminal 611 when there is a connection request from thecellular phone terminal 611 having the non-permitted telephone number by way of theHTTP server 607. - Furthermore, in case of registering the location of the user of the
cellular phone terminal 611 in thepresence server 606 in the cellular phone privateinformation management system 601 by recognizing through any method such as, for example, entrance/exit control or the like by entrance permission, etc., theHTTP server 607 that receives a connection request from thecellular phone terminal 611 asks thepresence server 606 about the location of the user of thecellular phone terminal 611. After confirming whether or not the user is in the plant, a decision will be made whether the information in the address book, the bookmark or the mailbox should be disclosed or refused, thereby restricting the use of such private information in case when thecellular phone terminal 611 is lost or stolen. Instead of asking the present location of the user of thecellular phone terminal 611 by theHTTP server 607, it is also possible that theaddress book server 603, thebookmark information server 604 or themailbox server 605 asks the location of the user and a decision is made whether the connection to thecellular phone terminal 611 is permitted or refused based on the current location of the user of thecellular phone terminal 611 that is registered in thepresence server 606 at the time of connection from thecellular phone terminal 611. - Now, a method of searching the
address book server 603 or thebookmark information server 604 for a desired telephone number that thecellular phone terminal 611 is connected will be described further with reference toFig. 7 in an example of theaddress book server 603.Fig. 7 is a chart to describe one example of searching a telephone number in the fifth embodiment of the cellular phone system. - In
Fig. 7 , the cellular phone terminal 705 (corresponding to thecellular phone terminal 611 inFig. 6 ) is connected to the HTTP server 701 (corresponding to theHTTP server 607 inFig. 6 ) by way of a wireless cellularphone base station 704 and anIP network 703. After passing the certification in theHTTP server 701, it is possible on thecellular phone terminal 705 to browse the address to contact each user of thecellular phone terminal 705 that is stored in an address book server 702 (corresponding to theaddress book server 603 inFig. 6 ). - If the user of the
cellular phone terminal 705 chooses one address for, for example, "person A" among many addresses that he/she browsed, theHTTP server 701 calls the telephone number of "person A" using, for example, "phone to" in the HTML language. In this way, it is possible to call the telephone number in the address book on thecellular phone terminal 705 that is stored in theaddress book server 702 without saving the telephone number information in thecellular phone terminal 705. In other words, if described based on the system configuration inFig. 6 , one of the telephone numbers that are registered in theaddress book server 603 as private information of the user of thecellular phone terminal 611 is selected and the telephone number that is described in the HTML language "phone to" is transmitted to theIP network 608, thereby enabling to call the cellular phone terminal 612 or thetelephone terminal 613 by way of, for example, thetelephone network 609. - Subsequently, a method of searching a desired bookmark of the
cellular phone terminal 611 in thebookmark information server 604 will be described further with reference toFig. 8. Fig. 8 is a chart to describe an exemplified method of searching bookmarks in the fifth embodiment of the cellular phone system. - In
Fig. 8 , a cellular phone terminal 805 (corresponding to thecellular phone terminal 611 inFig. 6 ) is connected to an HTTP server 801 (corresponding to theHTTP server 607 inFig. 6 ) by way of a wireless cellularphone base station 804 and anIP network 803. After passing certification by theHTTP server 801, it is possible on thecellular phone terminal 805 to browse bookmark information on the users of thecellular phone terminal 805 stored in a bookmark information server 802 (corresponding to thebookmark information server 604 inFig. 6 ) in accordance with HTTP or HTTPS. - When the user of the
cellular phone terminal 805 chooses a bookmark information, for example, his/her "favorite A" from the browsed bookmark information, theHTTP server 801 makes a connection to a web server of his/her "favorite A" described in, for example, "URL" in the HTML language. In this manner, it is possible to access the web server on internet using the bookmark information on thecellular phone terminal 805 that is stored in thebookmark information server 802 without saving the bookmark information in thecellular phone terminal 805. In other words, if described using the system configuration inFig. 6 , any one of the bookmark information that is registered in thebookmark information server 604 as the private information for the user of thecellular phone terminal 611 for transmitting the address information described in "URL" in the HTML language to theIP network 608, thereby enabling to access to the web server on internet. - Now, a method of searching desired electronic mail information of the
cellular phone terminal 611 by themailbox server 605 is described further with reference toFig. 9. Fig. 9 is a chart to describe an exemplified method of searching electronic mail information in the fifth exemplary embodiment of the cellular phone system. - In
Fig. 9 , a cellular phone terminal 905 (corresponding to thecellular phone terminal 611 inFig. 6 ) is connected to an HTTP server 901 (corresponding to theHTTP server 607 inFig. 6 ) by way of a wireless cellularphone base station 904 and anIP network 903. After passing certification in theHTTP server 901, it is possible to browse on thecellular phone terminal 905 electronic mail information on users of thecellular phone terminal 905 stored in a mailbox server 902 (corresponding to themailbox server 605 inFig. 6 ) in accordance with HTTP, HTTPS or IMAP4 protocol. - When the user of the
cellular phone terminal 905 chooses one of the electronic mail information, for example,electronic mail 1 from the browsed electronic mail information, theHTTP server 901 reads out theelectronic mail 1 under the title of "Request for ......." stored in themailbox server 902 and transmits it to thecellular phone terminal 905 in accordance with the HTTP, HTTPS or IMAP4 protocol. In this manner, it is possible to browse the electronic mail information on thecellular phone terminal 905 stored in themailbox server 902 without saving the electronic mail information in thecellular phone terminal 905. In other words, describing in the system configuration inFig. 6 , it is possible to browse any desired electronic mail information in accordance with HTTP, HTTPS or IMAP4 protocol by choosing any one of the electronic mail information stored in themailbox server 605 as the private information of the user of thecellular phone terminal 611. - As described in greater detail hereinabove, the exemplary embodiments are able to surely prevent private information from leaking in an unexpected situation when the cellular phone terminal is lost or stolen. Also, the present invention provides the aforementioned advantage without causing any inconvenience to the user of the cellular phone terminal. Moreover, the present invention is able to provide the aforementioned advantage with paying essentially no attention to private information protection by the user of the cellular phone terminal.
Claims (9)
- An address book server (403, 502) for relaying or transferring a call, the call being from a first phone terminal (406, 505) to the address book server (403, 502), to a second phone terminal (407) or a third phone terminal (408) of a recipient, the address book server (403, 502) configured to:store identification information of the second phone terminal (407) and identification information of a user of the second phone terminal (407) in association with each other, and store identification information of the third phone terminal (408) and identification information of a user of the third phone terminal (408) in association with each other;receive the call from the first phone terminal (406, 505) ;search for the identification information of the second phone terminal (407) or the third phone terminal (408) of the recipient that is associated with either:(i) the identification information of the user identified by voice recognition on voice information received from the first phone terminal (406, 505) as an instruction of a user of the first phone terminal (406, 505), or(ii) the identification information of the user received from the first phone terminal (406, 505) as the instruction, the identification information being in a form of an Integrated Services Digital Network, ISDN, sub-address or a Dual-Tone Multi-Frequency, DTMF, signal; andmake a call to the second phone terminal (407) or the third phone terminal (408) of the recipient corresponding to the searched identification information so as to relay or transfer, to the second phone terminal (407) or the third phone terminal (408) of the recipient, the call from the first phone terminal (406, 505),wherein the first phone terminal (406, 505) and the second phone terminal (407) are cellular phone terminals,the user of the second phone terminal (407) is different from the user of the third phone terminal (408),the recipient is either the user of the second phone terminal (407) or the user of the third phone terminal (408).
- The address book server (403, 502) of claim 1,wherein the identification information of the user of the second phone terminal (407) comprises an identification number of the user of the second phone terminal (407) andthe identification information of the user of the third phone terminal (408) comprises an identification number of the user of the third phone terminal (408).
- The address book server (403, 502) of claim 1 or 2, further configured to
conduct voice certification also on the voice information received from the first phone terminal (406, 505), and restrict search of the identification information of the second phone terminal (407) or the third phone terminal (408) of the recipient when the voice certification is unsuccessful. - The address book server (403, 502) of claim 1 or 2, further configured toregister identification information of the first phone terminal (406, 505) in order for the first phone terminal (406, 505) to be prohibited from using the identification information of the second phone terminal (407) and the identification information of the third phone terminal (408) that are stored, andprohibit, when the call from the first phone terminal (406, 505) is received and the identification information of the first phone terminal (406, 505) is already registered, search of the identification information of the second phone terminal (407) or the third phone terminal (408) of the recipient such that the call is not relayed or transferred.
- The address book server (403, 502) of claim 3, further configured toregister identification information of the first phone terminal (406, 505) in order for the first phone terminal (406, 505) to be prohibited from using the identification information of the second phone terminal (407) and the identification information of the third phone terminal (408) that are stored, andprohibit, when the call from the first phone terminal (406, 505) is received and the identification information of the first phone terminal (406, 505) is already registered, the search of the identification information of the second phone terminal (407) or the third phone terminal (408) of the recipient such that the call is not relayed or transferred.
- The address book server (403, 502) of any one of claims 1 to 5, whereinthe identification information of the second phone terminal (407) is a phone number or an Internet Protocol (IP) address of the second phone terminal (407), andthe identification information of the third phone terminal (408) is a phone number or an Internet Protocol (IP) address of the third phone terminal (408).
- A system, comprising:the address book server (403, 502) of any one of claims 1 to 6; anda presence server (409) configured to register a current location of the user of the first phone terminal (406, 505), whereinthe address book server (403, 502) is configured to determine to permit or refuse relay or transfer of the call based on the registered location of the user of the first phone terminal (406, 505) registered by the presence server (409) .
- The system according to claim 7, further comprising:the first phone terminal (406, 505) and the second phone terminal (407), whereinthe first phone terminal (406, 505) and the second phone terminal (407) are adapted to connect to a public wireless cellular phone network.
- A method of an address book server (403, 502) for relaying or transferring a call, the call being from a first phone terminal (406, 505) to the address book server (403, 502), to a second phone terminal (407) or a third phone terminal (408) of a recipient, the method comprising:storing, by the address book server (403, 502), identification information of the second phone terminal (407) and identification information of a user of the second phone terminal (407) in association with each other, and identification information of the third phone terminal (408) and identification information of a user of the third phone terminal (408) in association with each other;receiving, by the address book server (403, 502), the call from the first phone terminal (406, 505);searching, by the address book server (403, 502), for the identification information of the second phone terminal (407) or the third phone terminal (408) of the recipient that is associated with either:(i) the identification information of the user identified by voice recognition on voice information received from the first phone terminal (406, 505) as an instruction of a user of the first phone terminal (406, 505), or(ii) the identification information of the user received from the first phone terminal (406, 505) as the instruction, the identification information being in a form of an Integrated Services Digital Network, ISDN, sub-address or a Dual-Tone Multi-Frequency, DTMF, signal; andmaking, by the address book server (403, 502), a call to the second phone terminal (407) or the third phone terminal (408) of the recipient corresponding to the searched identification information so as to relay or transfer, to the second phone terminal (407) or the third phone terminal (408) of the recipient, the call from the first phone terminal (406, 505),wherein the first phone terminal (406, 505) and the second phone terminal (407) are cellular phone terminals,the user of the second phone terminal (407) is different from the user of the third phone terminal (408), andthe recipient is either the user of the second phone terminal (407) or the user of the third phone terminal (408).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006143115A JP2007318245A (en) | 2006-05-23 | 2006-05-23 | Cellular phone system, cellular phone terminal, personal information protecting method, personal information protecting program and program recording medium |
EP07108670.6A EP1860857A3 (en) | 2006-05-23 | 2007-05-22 | Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07108670.6A Division EP1860857A3 (en) | 2006-05-23 | 2007-05-22 | Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3541053A1 EP3541053A1 (en) | 2019-09-18 |
EP3541053B1 true EP3541053B1 (en) | 2021-09-29 |
Family
ID=38472967
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19172743.7A Active EP3541053B1 (en) | 2006-05-23 | 2007-05-22 | Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium |
EP07108670.6A Ceased EP1860857A3 (en) | 2006-05-23 | 2007-05-22 | Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07108670.6A Ceased EP1860857A3 (en) | 2006-05-23 | 2007-05-22 | Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium |
Country Status (5)
Country | Link |
---|---|
US (1) | US8682323B2 (en) |
EP (2) | EP3541053B1 (en) |
JP (1) | JP2007318245A (en) |
KR (1) | KR100910430B1 (en) |
CN (2) | CN102209150A (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8995626B2 (en) | 2007-01-22 | 2015-03-31 | Microsoft Technology Licensing, Llc | Unified and consistent user experience for server and client-based services |
US20080253544A1 (en) * | 2007-04-12 | 2008-10-16 | Microsoft Corporation | Automatically aggregated probabilistic personal contacts |
US8538376B2 (en) * | 2007-12-28 | 2013-09-17 | Apple Inc. | Event-based modes for electronic devices |
JP5382778B2 (en) * | 2009-03-06 | 2014-01-08 | Necカシオモバイルコミュニケーションズ株式会社 | Network terminal device and program |
JP5254107B2 (en) * | 2009-03-27 | 2013-08-07 | 綜合警備保障株式会社 | Security inspection system, security inspection terminal, security inspection method, and security inspection program |
JP5545433B2 (en) * | 2010-03-04 | 2014-07-09 | サクサ株式会社 | Portable electronic device and operation control method for portable electronic device |
JP2012235424A (en) * | 2011-05-09 | 2012-11-29 | Nec Access Technica Ltd | Information management device, information management system, information management method, and program |
US9143910B2 (en) * | 2011-09-30 | 2015-09-22 | Blackberry Limited | Method and system for remote wipe through voice mail |
WO2013099403A1 (en) * | 2011-12-27 | 2013-07-04 | 日本電気株式会社 | Mobile terminal, security management method, and program |
US10812537B1 (en) * | 2018-07-23 | 2020-10-20 | Amazon Technologies, Inc. | Using network locality to automatically trigger arbitrary workflows |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6243739B1 (en) * | 1997-07-11 | 2001-06-05 | Phone.Com, Inc. | Reducing perceived latency in servicing user requests on low-bandwidth communication channels |
US5895471A (en) * | 1997-07-11 | 1999-04-20 | Unwired Planet, Inc. | Providing a directory of frequently used hyperlinks on a remote server |
JPH11234760A (en) * | 1998-02-09 | 1999-08-27 | Casio Comput Co Ltd | Radio communication terminal |
US6421536B1 (en) * | 1998-04-07 | 2002-07-16 | Matsushita Electric Industrial Co., Ltd. | Communication system |
JP2000102059A (en) * | 1998-09-25 | 2000-04-07 | Ntt Data Corp | Remote control system utilizing position information |
US6577849B1 (en) * | 1999-02-03 | 2003-06-10 | Motorola, Inc. | Method and apparatus for providing additional information about a broadcast |
US6633633B1 (en) * | 1999-12-22 | 2003-10-14 | Bellsouth Intellectuel Property Corporation | Method and system for providing calling number restoral |
US20030165128A1 (en) * | 2000-07-13 | 2003-09-04 | Rajendra Sisodia | Interactive communications system coupled to portable computing devices using short range communications |
US7305427B2 (en) * | 2000-08-07 | 2007-12-04 | Evan John Kaye | Shipping address automation method |
GB2366689A (en) * | 2000-08-11 | 2002-03-13 | Nokia Mobile Phones Ltd | Server image display on a mobile |
US20020075844A1 (en) * | 2000-12-15 | 2002-06-20 | Hagen W. Alexander | Integrating public and private network resources for optimized broadband wireless access and method |
CA2375844C (en) * | 2001-03-09 | 2008-12-30 | Research In Motion Limited | Advanced voice and data operations in a mobile data communication device |
JP4161028B2 (en) * | 2002-03-06 | 2008-10-08 | 株式会社日立国際電気 | Multi-service wireless communication system |
JP4239058B2 (en) * | 2002-05-22 | 2009-03-18 | ソニー株式会社 | Radio communication apparatus, radio communication apparatus control method, radio communication apparatus control method program, and recording medium storing radio communication apparatus control method program |
US20030220966A1 (en) * | 2002-05-24 | 2003-11-27 | International Business Machines Corporation | System and method for dynamic content dependent conflict resolution |
JP2004040595A (en) * | 2002-07-05 | 2004-02-05 | Sony Ericsson Mobilecommunications Japan Inc | Portable communication terminal |
US7139566B2 (en) * | 2002-09-10 | 2006-11-21 | Samsung Electronics Co., Ltd. | Method for informing mobile communication terminal of entrance into specific service network in mobile communication system and method for changing incoming call indication mode to vibration or silent mode |
JP2004153438A (en) * | 2002-10-29 | 2004-05-27 | Fujitsu Ltd | Communication apparatus, and information processing method and information processing program therefor |
KR100483690B1 (en) * | 2002-11-19 | 2005-04-18 | 케이티링커스 주식회사 | Multi-function public phone using of a wireless lan |
US7283831B2 (en) * | 2003-07-24 | 2007-10-16 | Lucent Technologies Inc. | Single sign-on service for communication network messaging |
JP2005051530A (en) * | 2003-07-29 | 2005-02-24 | Nec Infrontia Corp | Method and system for tracking and transferring positional information |
JP4310150B2 (en) * | 2003-08-29 | 2009-08-05 | 京セラ株式会社 | Mobile communication terminal and wireless communication system |
EP1528715B1 (en) * | 2003-10-30 | 2009-07-01 | Research In Motion Limited | Method for transmitting (receiving) cellular network information (e.g. MNC, NCC) by (from) a wireless local area network in an extensible authentication protocol (EAP) |
KR100664110B1 (en) * | 2004-02-04 | 2007-01-04 | 엘지전자 주식회사 | Usage restriction setting method for mobile communication device |
JP2006014008A (en) * | 2004-06-28 | 2006-01-12 | Ricoh Co Ltd | Paging system and paging method |
CN1738453A (en) * | 2004-08-20 | 2006-02-22 | 英业达股份有限公司 | Information encryption system and method |
KR20060027065A (en) * | 2004-09-22 | 2006-03-27 | 삼성전자주식회사 | Server of searching telephone number and method of speech recognition dialing |
KR20060052447A (en) * | 2004-11-03 | 2006-05-19 | 삼성전자주식회사 | Method and apparatus for transmitting a short message service between a mobile communication and a wireless local area network, system thereof |
JP3894450B2 (en) | 2004-11-24 | 2007-03-22 | 三菱電機株式会社 | Vehicle antitheft device |
KR20060098019A (en) * | 2005-03-08 | 2006-09-18 | 삼성전자주식회사 | Method of handover in dual mode mobile terminal |
US7849102B2 (en) * | 2005-09-07 | 2010-12-07 | Microsoft Corporation | Availability data service |
US7412224B2 (en) * | 2005-11-14 | 2008-08-12 | Nokia Corporation | Portable local server with context sensing |
US7809398B2 (en) * | 2006-03-24 | 2010-10-05 | At&T Intellectual Property I, L.P. | System and method of storing contact information |
JP4855212B2 (en) * | 2006-10-20 | 2012-01-18 | 株式会社エヌ・ティ・ティ・ドコモ | Wireless communication apparatus and wireless communication method |
US8006002B2 (en) * | 2006-12-12 | 2011-08-23 | Apple Inc. | Methods and systems for automatic configuration of peripherals |
-
2006
- 2006-05-23 JP JP2006143115A patent/JP2007318245A/en active Pending
-
2007
- 2007-05-22 EP EP19172743.7A patent/EP3541053B1/en active Active
- 2007-05-22 EP EP07108670.6A patent/EP1860857A3/en not_active Ceased
- 2007-05-22 US US11/752,027 patent/US8682323B2/en active Active
- 2007-05-23 KR KR1020070050203A patent/KR100910430B1/en not_active IP Right Cessation
- 2007-05-23 CN CN2011101491026A patent/CN102209150A/en active Pending
- 2007-05-23 CN CN2007101042603A patent/CN101141730B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
KR20070113158A (en) | 2007-11-28 |
CN102209150A (en) | 2011-10-05 |
EP1860857A2 (en) | 2007-11-28 |
JP2007318245A (en) | 2007-12-06 |
EP3541053A1 (en) | 2019-09-18 |
CN101141730B (en) | 2012-06-20 |
KR100910430B1 (en) | 2009-08-04 |
EP1860857A3 (en) | 2013-08-07 |
US8682323B2 (en) | 2014-03-25 |
US20070275720A1 (en) | 2007-11-29 |
CN101141730A (en) | 2008-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3541053B1 (en) | Cellular phone system, cellular phone terminal, private information protection method, private information protection program and program recorded medium | |
US7793305B2 (en) | Methods and systems for providing a communication manager for wireless wireline converged telecommunication services | |
JP3940078B2 (en) | Method and system for remote call forwarding from IP connection of telephone calls | |
KR101042058B1 (en) | Telephone and telephone control method | |
US20070123276A1 (en) | Secure valet telephone system apparatus and method | |
CN101682613A (en) | Method and apparatus for event-based exchange of information between communication devices conditioned on personal calendar information | |
CN100493124C (en) | Method for dynamically providing a terminal connected to a public communication network, with services offered by a dedicated telecommunication network | |
US8885810B2 (en) | Telephone communication control apparatus, telephone communication system and telephone communication control method used for the same | |
KR100554436B1 (en) | Web access providing system | |
CN101669354A (en) | Method and apparatus for event-based synchronization of information between communication devices | |
CN102238009A (en) | Method and system for improved communication security | |
US8000678B1 (en) | Information provisioning for emergency calls | |
JP3877669B2 (en) | Telephone exchange system | |
JP2005341497A (en) | E-mail interlocked callback system and private branch exchange used for it | |
KR101070543B1 (en) | method and system for providing personal information security in network | |
JP4047736B2 (en) | Information management service method and system | |
JP2004343492A (en) | Automatic answering telephone system and method for controlling automatic answering telephone | |
WO2011001171A1 (en) | A system for recording voice/data transmissions | |
KR100805739B1 (en) | Call setup controlling method | |
US20080125100A1 (en) | Mobile device outbound personality portability | |
SE516341C2 (en) | Procedure and system for privacy positioning of a mobile station | |
WO2007133284A2 (en) | Adding an identified caller's other devices to a voice mail system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
|
AC | Divisional application: reference to earlier application |
Ref document number: 1860857 Country of ref document: EP Kind code of ref document: P |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): DE FR GB |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20200224 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): DE FR GB |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200729 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20210531 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: RAKUTEN GROUP, INC. |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AC | Divisional application: reference to earlier application |
Ref document number: 1860857 Country of ref document: EP Kind code of ref document: P |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602007061324 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602007061324 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20220630 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20240418 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240418 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240418 Year of fee payment: 18 |